Applied Mechanics and Materials
Vol. 528
Vol. 528
Applied Mechanics and Materials
Vol. 527
Vol. 527
Applied Mechanics and Materials
Vol. 526
Vol. 526
Applied Mechanics and Materials
Vol. 525
Vol. 525
Applied Mechanics and Materials
Vols. 522-524
Vols. 522-524
Applied Mechanics and Materials
Vol. 521
Vol. 521
Applied Mechanics and Materials
Vols. 519-520
Vols. 519-520
Applied Mechanics and Materials
Vol. 518
Vol. 518
Applied Mechanics and Materials
Vols. 513-517
Vols. 513-517
Applied Mechanics and Materials
Vols. 511-512
Vols. 511-512
Applied Mechanics and Materials
Vol. 510
Vol. 510
Applied Mechanics and Materials
Vol. 509
Vol. 509
Applied Mechanics and Materials
Vol. 508
Vol. 508
Applied Mechanics and Materials Vols. 519-520
Paper Title Page
Abstract: Dynamic detection method based on software behavior is an efficient and effective way for anti-virus technology. Malware and benign executable differ mainly in the implementation of some special behavior to propagation and destruction. A program's execution flow is essentially equivalent to the stream of API calls. Analyzing the API calls frequency from six kinds of behaviors in the same time has the very well differentiate between malicious and benign executables. This paper proposed a dynamic malware detection approach by mining the frequency of sensitive native API calls and described experiments conducted against recent Win32 malware. Experimental results indicate that the detection rate of proposed method is 98% and the value of the AUC is 0.981. Furthermore, proposed method can identify known and unknown malware.
309
Abstract: The unified modeling language (UML) was introduced to describe the model of the general framework of the professional image processing system (PIPS). The required functions, basic components and working principle of the general framework were discussed and given in the UML. The traditional mode and the novel mode based on the general framework were compared to develop a representative image processing system. Results demonstrate that the amount of person-months of the human resource of various ability levels can be reduced by at least 50%. Compared with traditional mode, the novel mode can improve efficiency, reduce risk and benefit to teamwork by making researchers only focus on the development of kernel modules rather than the other inefficient and repetitive works. This mechanism is also applicable to other similar systems.
313
Abstract: The precise context of user tasks helps to ameliorate personal information management on desktop. This paper introduces a novel approach to discern user tasks using contextual information which is divided into two categories, user behavior based context and text based context. With the contextual information, user tasks are discerned by support vector machine (SVM) method. Experimental results showed the impact of distinct attributes of files on the performance of user task identification.
318
Abstract: The ambiguity and dynamics of the users demand in the requirement phase of the classic waterfall model, as well as the information errors caused by the professional psychological differences between the end-users and software developers threaten the software development process and the quality of the final outcome. This paper makes a deep analysis on the dependence of manual examination and verification among users and developers, and formulates a reasonable solution to improve the accuracy, completeness in the requirements phase by leading in the UML pattern.
322
Abstract: With the rapid development of information technology, office automation has gradually become popular. Library Office Automation (abbreviated OA) system , which can improve efficiency, standardize business processes, reduce office costs, is the symbol for library to achieve modern management. This paper makes Shenyang Aerospace University Library as an example, discusses how to use the core technology of current information field ----- workflow technology, designs and implements OA system, so as to provide a new platform for library modern management.
329
Abstract: VMF Bit Analysis Tool is a testing and analyzing utility for VMF Codecs, the main function is graphically presenting the message content & code relationship. This paper proposes an automatic VMF Bit Analysis Tool generation method, which uses the VMF Data Element Dictionary as the input data. This method includes such steps: design of VMF Data Element Dictionary, message format analysis, generation of message storage struct, generation of message pack & unpack function and generation of the interface of Analysis Tool. Lastly this method has been implemented and the experiment results show that the tool generated by the method can satisfy the function requirements, also this method can reduce the maintenance time for the tool incorporating the up-to-date information of the VMF Standard.
333
Abstract: Object management Petri net technique is developed to integrate analysis, design and implementation for applications of management information system. Not only object concept is adopted to describe tokens in places, but also class inheritance and composition, user interface and complicate algorithm are represented by expanded transitions. Three kinds of work modes of object management Petri net are introduced to fulfill development, execution, and simulation of the net system.
339
Abstract: The software status identification with a message authentication code generated by means of the hash function method that falls within the message authentication technology is discussed in this document. In comparison with the software status management with a software version number that is used widely at present, the message authentication code is highly correlated with the software content to prevent failure of the software status management due to artificial negligence and provide an effective technique for software status management.
343
Abstract: This paper proposed a new method to represent the chessboard of the game of Checkers. This method can do convenient and quick recognition and evaluation of situations of the chessboard formed in the process of game play than other representation methods. The algorithms effectively enhanced the power of the program in substantial experiments.
350
Abstract: ArcGIS and AutoCAD Map 3D are both geographic information system (GIS) software. Both are used worldwide in many countries and companies. The dataflow design in visual editors is suitable for daily work. Visual languages are valuable for wide user community. Dataflow design automatizes typical GIS tasks and makes the processes universal. It is possible to construct simple or complex workflows with a visual editor in both software. The concept of visual programming is highly acceptable for GIS users because they think spatially and graphically. The article presented practical example for automatic finding of suitable area for construction of new hotel. Two data flow diagrams for the same task demonstrate the differences between graphical notations in ArcGIS and AutoCAD Map.
355